Security for e-Learning
暂无分享,去创建一个
[1] Lorenzo Garc'ia Aretio,et al. Las TIC en el sistema universitario español , 2005 .
[2] Bill Cheswick,et al. Firewalls and internet security - repelling the wily hacker , 2003, Addison-Wesley professional computing series.
[3] Nikleia Eteokleous,et al. We need an educationally relevant definition of mobile learning , 2005 .
[4] Susan J. Lincke,et al. Designing System Security with UML Misuse Deployment Diagrams , 2012, 2012 IEEE Sixth International Conference on Software Security and Reliability Companion.
[5] Adam Všetíček. MOOC (Massive Open Online Course) , 2014 .
[6] Fatos Xhafa,et al. Using mobile devices to support online collaborative learning , 2010 .
[7] Susan K. Ferencz,et al. Privacy Issues in a Virtual Learning Environment. , 1998 .
[8] Nitesh V. Chawla,et al. Authentication anomaly detection: a case study on a virtual private network , 2007, MineNet '07.
[9] Manesh Sadasivan,et al. Multi-layered collaborative approach to address enterprise mobile security challenges , 2010, 2010 IEEE 2nd Workshop on Collaborative Security Technologies.
[10] J.C.G. Hernandez,et al. Moodle security vulnerabilities , 2008, 2008 5th International Conference on Electrical Engineering, Computing Science and Automatic Control.
[11] Kamlesh Dutta,et al. INVESTIGATION ON SECURITY IN LMS MOODLE , 2011 .
[12] Timothy Koschmann,et al. Paradigm Shift s and Instructional Technology , 1996 .
[13] Shon Harris. All-in-one CISSP certification exam guide , 2003 .
[14] Yair Levy,et al. A Theoretical Approach for Biometrics Authentication of e-Exams , 2007 .
[15] Mike Sharples,et al. Towards a Theory of Mobile Learning , 2005 .
[16] Gary Wills,et al. An approach to presence verification in summative e-assessment security , 2010, 2010 International Conference on Information Society.
[17] Kikelomo Maria Apampa. Presence verification for summative e-assessments , 2010 .
[18] Zongwei Luo,et al. A Mobile Service Platform for Trustworthy E-Learning Service Provisioning , 2010, Int. J. Dependable Trust. Inf. Syst..
[19] Boaz Gelbord,et al. On the use of PKI technologies for secure and private e-learning environments , 2003, CompSysTech '03.
[20] Wolfgang Hommel. Security and Privacy Management for Learning Management Systems , 2010 .
[21] Jonathan Haber. The Future of MOOCs , 2014 .
[22] Gilbert Moïsio,et al. Internet Engineering Task Force , 2014 .
[23] P. Laforcade. Towards a UML-based educational modeling language , 2005, Fifth IEEE International Conference on Advanced Learning Technologies (ICALT'05).
[24] Valentin Robu,et al. Emergence of consensus and shared vocabularies in collaborative tagging systems , 2009, TWEB.
[25] Christian J. Eibl. Discussion of information security in e-learning , 2010 .
[26] Jianming Yong. Digital Identity Design and Privacy Preservation for e-Learning , 2007, 2007 11th International Conference on Computer Supported Cooperative Work in Design.
[27] K. Schwab. Global Risks 2014 , 2014 .
[28] Manuel Mazzara,et al. Social Networks and Collective Intelligence: A Return to the Agora , 2013, ArXiv.
[29] Pei Jiao. How to solve the security and privacy problems within e-learning , 2011, 2011 IEEE International Symposium on IT in Medicine and Education.
[30] Joerg Zumbach,et al. Supporting Distributed Problem-Based Learning: The Use of Feedback Mechanisms in Outline Learning , 2004 .
[31] Georgios Kambourakis,et al. A PKI approach for deploying modern secure distributed e-learning and m-learning environments , 2007, Comput. Educ..
[32] Jordi Herrera-Joancomartí,et al. A secure e-exam management system , 2006, First International Conference on Availability, Reliability and Security (ARES'06).
[33] George Siemens,et al. The MOOC model for digital practice , 2010 .
[34] Morten Flate Paulsen,et al. Online Education Systems: Discussion and Definition of Terms , 2002 .
[35] Gerry Stahl,et al. Contributions to a theoretical framework for CSCL , 2002, CSCL.
[36] Edgar R. Weippl. Security in e-learning , 2005, ELERN.
[37] Kapil Raina. PKI Security Solutions for the Enterprise: Solving HIPAA, E-Paper Act, and Other Compliance Issues , 2003 .
[38] Jasmin Azemovic,et al. Model of efficient Assessment System with accent on privacy, security and integration with E-University components , 2010, 2010 2nd International Conference on Education Technology and Computer.
[39] Khalil El-Khatib,et al. Privacy and Security in E-Learning , 2003, Int. J. Distance Educ. Technol..
[40] David Arroyo,et al. An Approach for Adapting Moodle into a Secure Infrastructure , 2011, CISIS.
[41] Luca Longo,et al. Enhancing Social Search: A Computational Collective Intelligence Model of Behavioural Traits, Trust and Time , 2010, Trans. Comput. Collect. Intell..
[42] Albert Sangrà. A New Learning Model for the Information and Knowledge Society: The Case of the Universitat Oberta de Catalunya (UOC), Spain , 2002 .
[43] Laurianne McLaughlin,et al. Interview: Holistic Security , 2005, IEEE Secur. Priv..
[44] Zheng Wu,et al. A Taxonomy of Network and Computer Attacks Based on Responses , 2011, 2011 International Conference of Information Technology, Computer Engineering and Management Sciences.
[45] Sigrid E. Schubert,et al. Development of E-Learning Design Criteria with Secure Realization Concepts , 2008, ISSEP.
[46] Donn B. Parker,et al. Toward a New Framework for Information Security , 2015 .
[47] Sébastien George,et al. Privacy Concerns in E-learning: Is Using Tracking System a Threat? , 2011 .
[48] P. Dillenbourg. What do you mean by collaborative learning , 1999 .
[49] Stewart Kowalski,et al. Secure e-learning using a holistic and immune security framework , 2009, 2009 International Conference for Internet Technology and Secured Transactions, (ICITST).
[50] K. Pisutova,et al. Open education , 2012, 2012 IEEE 10th International Conference on Emerging eLearning Technologies and Applications (ICETA).